c:\Users\vampire_n0S\Documents\Visual Studio 2012\Projects\Impa\Impa\obj\Release\amsu.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Baza de date metin2 GLOBAL/Decrypt MySQL.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Baza de date metin2 GLOBAL/Decrypt MySQL.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Baza de date metin2 GLOBAL/MD5 password decrypter.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Baza de date metin2 GLOBAL/MD5 password decrypter.exe
Resource
win10v2004-20240426-en
General
-
Target
45542039fb5dc73449261733f5d63bf3_JaffaCakes118
-
Size
2.6MB
-
MD5
45542039fb5dc73449261733f5d63bf3
-
SHA1
aed7bd1253575385937c4303a600bbf14b0440f8
-
SHA256
b7c53fa3bea54bdb68c87da256ae85db15156a4e4ba063e790fad25e1cfaa026
-
SHA512
45005a87f9ff3b4015cd0358459ded2985781ff6707eac8c3d11841bacf2557c1647bc31fb174211c5981833af4bd5d3272133e1378d097d297cfe743711b2db
-
SSDEEP
49152:OnXkaPFJXkdGREvAhfiWZpMHKxo8z+kHi/UzgawVk5Sz9c3DQsdDAnOT:4ldBEqZpSKxoUH+9k8D2An4
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/Baza de date metin2 GLOBAL/Decrypt MySQL.exe unpack001/Baza de date metin2 GLOBAL/MD5 password decrypter.exe
Files
-
45542039fb5dc73449261733f5d63bf3_JaffaCakes118.rar
-
Baza de date metin2 GLOBAL/Accounts Global.txt
-
Baza de date metin2 GLOBAL/Decrypt MySQL.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Baza de date metin2 GLOBAL/MD5 password decrypter.exe.exe windows:5 windows x86 arch:x86
d3026df4dd607ee096a0c36c6099eddf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenW
CloseHandle
LocalFree
lstrcpyW
LoadLibraryW
GetModuleFileNameW
GetLastError
HeapFree
HeapAlloc
HeapReAlloc
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
GetModuleHandleW
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
GetProcAddress
VirtualAlloc
GetCurrentProcess
FlushInstructionCache
TlsFree
WideCharToMultiByte
user32
SendMessageW
wsprintfW
FindWindowW
shlwapi
StrCpyW
shell32
SHGetSpecialFolderPathW
advapi32
SetSecurityInfo
SetEntriesInAclW
AllocateAndInitializeSid
GetSecurityInfo
FreeSid
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ